article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. Trend of malicious JavaScript downloading Shade ransomware (source: ESET).

article thumbnail

Security Affairs newsletter Round 478 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Korean Hackers Target Global Infrastructure with Ransomware Cybersecurity Perplexity Plagiarized Our Story About How Perplexity Is a B t Machine Sanctions Six Russian Hackers Pierluigi Paganini Follow me on Twitter: @securityaffairs and Facebook and Mastodon ( SecurityAffairs – hacking, newsletter)

Security 315
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Security Affairs

Hacked websites were used for several malicious purposes, experts observed compromised WordPress and Joomla websites serving Shade /Troldesh ransomware, coin miners, backdoors, and some times were involved in phishing campaigns. jpg are EXE files that are the Shade ransomware. jpg are EXE files that are the Shade ransomware.

CMS 279
article thumbnail

Gootkit delivery platform Gootloader used to deliver additional payloads

Security Affairs

The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. The framework was improved to deploy a wider range of malware, including ransomware payloads. ” reads the analysis published by researchers Gabor Szappanos and Andrew Brandt from Sophos.

article thumbnail

Security Affairs newsletter Round 512 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog Atlassian fixed critical flaws in Confluence and Crowd Salt Typhoon used custom malware JumbledPath to spy U.S. Lazarus APT stole $1.5B

Security 162
article thumbnail

Security Affairs newsletter Round 368 by Pierluigi Paganini

Security Affairs

Anonymous: Operation Russia after 100 days of war GitLab addressed critical account take over via SCIM email change LuoYu APT delivers WinDealer malware via man-on-the-side attacks Clipminer Botnet already allowed operators to make at least $1.7 Million Alert!

Security 263
article thumbnail

Security Affairs newsletter Round 376 by Pierluigi Paganini

Security Affairs

and Blackmatter ransomware U.S. and Blackmatter ransomware U.S. Every week the best security articles from Security Affairs for free in your email box. If you want to also receive for free the newsletter with the international press subscribe here.

Security 246